Chapter 2 Cryptography Flashcards

1
Q

Which of the following is a good example of a key that is only used once?

A. OTP

B. ISAKMP

C. Multifactor key

D. None of these answers are correct

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a type of cipher that uses the same key to encrypt and decrypt?

A. Symmetric

B. Asymmetric

C. Ciphertext

D. RSA

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a symmetric key cipher where the plaintext data to be encrypted is done a bit at a time against the bits of the key stream, also called a cipher digit stream?

A. Asymmetric cipher

B. Block cipher

C. Stream cipher

D. None of these answers is correct.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not an example of a symmetric encryption algorithm?

A. AES

B. 3DES

C. RC4

D. RSA

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an algorithm that allows two devices to negotiate and establish shared secret keying material (keys) over an untrusted network?

A. Diffie-Hellman

B. RSA

C. RC4

D. IKE

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Assume that Mike is trying to send an encrypted email to Chris using PGP or S/MIME. What key will Mike use to encrypt the email to Chris?

A. Chris’s private key

B. Chris’s public key

C. Mike’s private key

D. Mike’s public key

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following implementations uses a key pair?

A. PGP

B. Digital certificates on a web server running TLS

C. S/MIME

D. All of these answers are correct.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an entity that creates and issues digital certificates?

A. Certificate Registry (CR)

B. Certificate Authentication Server (CAS)

C. Certificate Authority (CA)

D. None of these answers is correct.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements is true?

A. Subordinate CA servers can be invalidated.

B. Subordinate certificates cannot be invalidated.

C. Root certificates cannot be invalidated.

D. Root CAs cannot be invalidated.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a series of standards focused on directory services and how those directories are organized?

A. 802.1X

B. X.500

C. X.11

D. X.409

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are examples of common methods used by ciphers?

A. Transposition

B. Substitution

C. Polyalphabetic

D. Polynomial

A

A, B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are examples of symmetric block cipher algorithms?

A. Advanced Encryption Standard (AES)

B. Triple Digital Encryption Standard (3DES)

C. DSA

D. Blowfish

E. ElGamal

A

A, B, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following are examples of hashes?

A. ASH-160

B. SHA-1

C. SHA-2

D. MD5

A

B, C, D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are benefits of digital signatures?

A. Authentication

B. Nonrepudiation

C. Encryption

D. Hashing

A

A & B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following statements are true about public and private key pairs?

A. A key pair is a set of two keys that work in combination with each other as a team.

B. A key pair is a set of two keys that work in isolation.

C. If you use the public key to encrypt data using an asymmetric encryption algorithm, the corresponding private key is used to decrypt the data.

D. If you use the public key to encrypt data using an asymmetric encryption algorithm, the peer decrypts the data with that public key.

A

A & C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following entities can be found inside of a digital certificate?

A. FQDN

B. DNS server IP address

C. Default gateway

D. Public key

A

A & D

17
Q

Which of the following is true about root certificates?

A. A root certificate contains information about the user.

B. A root certificate contains information about the network security device.

C. A root certificate contains the public key of the CA.

D. Root certificates never expire.

A

C

18
Q

Which of the following are public key standards?

A. IPsec

B. PKCS #10

C. PKCS #12

D. ISO33012

E. AES

A

B & C

19
Q

Most digital certificates contain which of the following information?

A. Serial number

B. Signature

C. Thumbprint (fingerprint)

D. All of these answers are correct.

A

D

20
Q

Which of the following is a format for storing both public and private keys using a symmetric password-based key to “unlock” the data whenever the key needs to be used or accessed?

A. PKCS #12

B. PKCS #10

C. PKCS #7

D. None of these answers is correct.

A

A